Checkmarx / red-lili
This open-source project tracks RED-LILI's activity over time as there are evidence the actor is still active. All information provided here is intended for research purposes.
☆11Updated last year
Alternatives and similar repositories for red-lili:
Users that are interested in red-lili are comparing it to the libraries listed below
- Maturity Model Collaborative project☆14Updated 2 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- PoC: Python package static and dynamic analysis to detect environment variable stealing☆10Updated 4 years ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆26Updated 9 months ago
- Dependency Combobulator☆93Updated last year
- A tool for auditing medical devices and healthcare infrastructure☆20Updated last year
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated last year
- A regular expression fuzzer.☆43Updated 7 years ago
- Quickly add http and https domains to BurpSuite's scope with all paths.☆16Updated 8 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆11Updated 2 years ago
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 4 years ago
- A Mozilla Firefox extension which allows quick access to your google-dorking result☆19Updated 4 years ago
- A Developer and Security Engineer friendly package for Securing NodeJS Applications.☆27Updated 2 years ago
- CveXplore☆36Updated last week
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- a shared short domain for XSS and other hacks☆31Updated 3 years ago
- Adds extensibility to Burp by using a list of payloads to pattern match on HTTP responses highlighting interesting and potentially vulner…☆15Updated last year
- A collection of my Semgrep rules☆48Updated last year
- Burp extension to generate multi-step CSRF POC.☆29Updated 5 years ago
- Lab exercises to practice privilege escalation scenarios in AWS IAM. These exercises and the slides go through the basics behind AWS IAM,…☆16Updated 5 years ago
- Collection of python helper API's for interacting with LGTM.com in ways the official API doesn't support.☆23Updated 2 years ago
- Tool to predict attacker groups from the techniques and software used☆49Updated 3 years ago
- Python script to check GitHub accounts for world-editable wiki pages☆21Updated last year
- Cryptovenom: The Cryptography Swiss Army Knife☆9Updated 5 years ago
- Simple burp extension for routing traffic over tor. It instruments tor to switch to a new circuit after every N requests.☆19Updated 2 years ago
- Static Token And Credential Scanner☆96Updated last year
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆22Updated 3 weeks ago
- Manager of third-party sources of Semgrep rules 🗂☆81Updated 8 months ago
- Python Package for burprestapi☆16Updated 5 years ago
- Everything about xss protection technology☆15Updated 5 years ago